files.com 1.0.370 → 1.0.371

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0d2fe78953773ed28ca9092c5ac4bd98424cebe39719349b2f8da32498e9f3f3
4
- data.tar.gz: 2497dc7f393eabfc34bc3a85a6c3678960e663db780d75cb0e0116701e620cef
3
+ metadata.gz: '0811bbd05ab1828ae8a62a6439f3133e269c36996ef927ca24602c81333ff4a1'
4
+ data.tar.gz: fcd74ccaab330bc3d53cdf2d8e76a34667f84e6041c0a8a8e4e860f7a10e5209
5
5
  SHA512:
6
- metadata.gz: cbba291e41dccd38391815dbf7393c5e5c3d891f32c0dec1accb9d7d0137471fdf8c1284e48ad9594388bd48f261f8781cf13c74c57df7214dcf5b09afba3849
7
- data.tar.gz: ca21c9b79c0ef2a434b983cccd1aeae9a0d7afd0524a7dec8ffa2820952f9770d6edc8622418afa24f956d8765635343c27553703c398bc881b5adf5127b330d
6
+ metadata.gz: 8cd726b632441a2899cde0be800fdc86f11559420a59d455a1bdf985ea2fa0010e761e2ede3a24578bdd8292d9f114da34915e0f88d555da951ee52bd9aa0aba
7
+ data.tar.gz: 23e0abdef92a20a351d2ff3f42986acabe310e13b7c8dc1f8ddd063dcaa126c9ec11c256e533e14a112635269547abf058223022de30b2c01c2f742a9775515e
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.0.370
1
+ 1.0.371
data/docs/public_key.md CHANGED
@@ -7,7 +7,9 @@
7
7
  "id": 1,
8
8
  "title": "My public key",
9
9
  "created_at": "2000-01-01T01:00:00Z",
10
- "fingerprint": "43:51:43:a1:b5:fc:8b:b7:0a:3a:a9:b1:0f:66:73:a8"
10
+ "fingerprint": "43:51:43:a1:b5:fc:8b:b7:0a:3a:a9:b1:0f:66:73:a8",
11
+ "username": "User",
12
+ "user_id": 1
11
13
  }
12
14
  ```
13
15
 
@@ -15,7 +17,8 @@
15
17
  * `title` (string): Public key title
16
18
  * `created_at` (date-time): Public key created at date/time
17
19
  * `fingerprint` (string): Public key fingerprint
18
- * `user_id` (int64): User ID. Provide a value of `0` to operate the current session's user.
20
+ * `username` (string): Username of the user this public key is associated with
21
+ * `user_id` (int64): User ID this public key is associated with
19
22
  * `public_key` (string): Actual contents of SSH key.
20
23
 
21
24
 
data/docs/user.md CHANGED
@@ -216,6 +216,7 @@ Files::User.create(
216
216
  office_integration_enabled: true,
217
217
  password_validity_days: 1,
218
218
  receive_admin_alerts: true,
219
+ require_login_by: "2000-01-01T01:00:00Z",
219
220
  require_password_change: true,
220
221
  restapi_permission: true,
221
222
  self_managed: true,
@@ -265,6 +266,7 @@ Files::User.create(
265
266
  * `office_integration_enabled` (boolean): Enable integration with Office for the web?
266
267
  * `password_validity_days` (int64): Number of days to allow user to use the same password
267
268
  * `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
269
+ * `require_login_by` (string): Require user to login by specified date otherwise it will be disabled.
268
270
  * `require_password_change` (boolean): Is a password change required upon next user login?
269
271
  * `restapi_permission` (boolean): Can this user access the REST API?
270
272
  * `self_managed` (boolean): Does this user manage it's own credentials or is it a shared/bot user?
@@ -349,6 +351,7 @@ Files::User.update(id,
349
351
  office_integration_enabled: true,
350
352
  password_validity_days: 1,
351
353
  receive_admin_alerts: true,
354
+ require_login_by: "2000-01-01T01:00:00Z",
352
355
  require_password_change: true,
353
356
  restapi_permission: true,
354
357
  self_managed: true,
@@ -399,6 +402,7 @@ Files::User.update(id,
399
402
  * `office_integration_enabled` (boolean): Enable integration with Office for the web?
400
403
  * `password_validity_days` (int64): Number of days to allow user to use the same password
401
404
  * `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
405
+ * `require_login_by` (string): Require user to login by specified date otherwise it will be disabled.
402
406
  * `require_password_change` (boolean): Is a password change required upon next user login?
403
407
  * `restapi_permission` (boolean): Can this user access the REST API?
404
408
  * `self_managed` (boolean): Does this user manage it's own credentials or is it a shared/bot user?
@@ -504,6 +508,7 @@ user.update(
504
508
  office_integration_enabled: true,
505
509
  password_validity_days: 1,
506
510
  receive_admin_alerts: true,
511
+ require_login_by: "2000-01-01T01:00:00Z",
507
512
  require_password_change: true,
508
513
  restapi_permission: true,
509
514
  self_managed: true,
@@ -554,6 +559,7 @@ user.update(
554
559
  * `office_integration_enabled` (boolean): Enable integration with Office for the web?
555
560
  * `password_validity_days` (int64): Number of days to allow user to use the same password
556
561
  * `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
562
+ * `require_login_by` (string): Require user to login by specified date otherwise it will be disabled.
557
563
  * `require_password_change` (boolean): Is a password change required upon next user login?
558
564
  * `restapi_permission` (boolean): Can this user access the REST API?
559
565
  * `self_managed` (boolean): Does this user manage it's own credentials or is it a shared/bot user?
@@ -41,7 +41,16 @@ module Files
41
41
  @attributes[:fingerprint] = value
42
42
  end
43
43
 
44
- # int64 - User ID. Provide a value of `0` to operate the current session's user.
44
+ # string - Username of the user this public key is associated with
45
+ def username
46
+ @attributes[:username]
47
+ end
48
+
49
+ def username=(value)
50
+ @attributes[:username] = value
51
+ end
52
+
53
+ # int64 - User ID this public key is associated with
45
54
  def user_id
46
55
  @attributes[:user_id]
47
56
  end
@@ -700,6 +700,7 @@ module Files
700
700
  # office_integration_enabled - boolean - Enable integration with Office for the web?
701
701
  # password_validity_days - int64 - Number of days to allow user to use the same password
702
702
  # receive_admin_alerts - boolean - Should the user receive admin alerts such a certificate expiration notifications and overages?
703
+ # require_login_by - string - Require user to login by specified date otherwise it will be disabled.
703
704
  # require_password_change - boolean - Is a password change required upon next user login?
704
705
  # restapi_permission - boolean - Can this user access the REST API?
705
706
  # self_managed - boolean - Does this user manage it's own credentials or is it a shared/bot user?
@@ -737,6 +738,7 @@ module Files
737
738
  raise InvalidParameterError.new("Bad parameter: company must be an String") if params[:company] and !params[:company].is_a?(String)
738
739
  raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
739
740
  raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params[:password_validity_days] and !params[:password_validity_days].is_a?(Integer)
741
+ raise InvalidParameterError.new("Bad parameter: require_login_by must be an String") if params[:require_login_by] and !params[:require_login_by].is_a?(String)
740
742
  raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params[:ssl_required] and !params[:ssl_required].is_a?(String)
741
743
  raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params[:sso_strategy_id] and !params[:sso_strategy_id].is_a?(Integer)
742
744
  raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params[:require_2fa] and !params[:require_2fa].is_a?(String)
@@ -860,6 +862,7 @@ module Files
860
862
  # office_integration_enabled - boolean - Enable integration with Office for the web?
861
863
  # password_validity_days - int64 - Number of days to allow user to use the same password
862
864
  # receive_admin_alerts - boolean - Should the user receive admin alerts such a certificate expiration notifications and overages?
865
+ # require_login_by - string - Require user to login by specified date otherwise it will be disabled.
863
866
  # require_password_change - boolean - Is a password change required upon next user login?
864
867
  # restapi_permission - boolean - Can this user access the REST API?
865
868
  # self_managed - boolean - Does this user manage it's own credentials or is it a shared/bot user?
@@ -893,6 +896,7 @@ module Files
893
896
  raise InvalidParameterError.new("Bad parameter: company must be an String") if params[:company] and !params[:company].is_a?(String)
894
897
  raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
895
898
  raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params[:password_validity_days] and !params[:password_validity_days].is_a?(Integer)
899
+ raise InvalidParameterError.new("Bad parameter: require_login_by must be an String") if params[:require_login_by] and !params[:require_login_by].is_a?(String)
896
900
  raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params[:ssl_required] and !params[:ssl_required].is_a?(String)
897
901
  raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params[:sso_strategy_id] and !params[:sso_strategy_id].is_a?(Integer)
898
902
  raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params[:require_2fa] and !params[:require_2fa].is_a?(String)
@@ -969,6 +973,7 @@ module Files
969
973
  # office_integration_enabled - boolean - Enable integration with Office for the web?
970
974
  # password_validity_days - int64 - Number of days to allow user to use the same password
971
975
  # receive_admin_alerts - boolean - Should the user receive admin alerts such a certificate expiration notifications and overages?
976
+ # require_login_by - string - Require user to login by specified date otherwise it will be disabled.
972
977
  # require_password_change - boolean - Is a password change required upon next user login?
973
978
  # restapi_permission - boolean - Can this user access the REST API?
974
979
  # self_managed - boolean - Does this user manage it's own credentials or is it a shared/bot user?
@@ -1005,6 +1010,7 @@ module Files
1005
1010
  raise InvalidParameterError.new("Bad parameter: company must be an String") if params[:company] and !params[:company].is_a?(String)
1006
1011
  raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
1007
1012
  raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params[:password_validity_days] and !params[:password_validity_days].is_a?(Integer)
1013
+ raise InvalidParameterError.new("Bad parameter: require_login_by must be an String") if params[:require_login_by] and !params[:require_login_by].is_a?(String)
1008
1014
  raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params[:ssl_required] and !params[:ssl_required].is_a?(String)
1009
1015
  raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params[:sso_strategy_id] and !params[:sso_strategy_id].is_a?(Integer)
1010
1016
  raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params[:require_2fa] and !params[:require_2fa].is_a?(String)
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.370
4
+ version: 1.0.371
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-07-17 00:00:00.000000000 Z
11
+ date: 2023-07-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: addressable